<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-455175069379803891</id><updated>2024-11-01T16:29:11.043+05:30</updated><category term="Tips &#39;n&#39; Tricks"/><category term="The CYBER NEWS"/><category term="Tools"/><category term="Facebook Hacking"/><category term="Basic Hacking"/><category term="Downloads"/><category term="SEO Tips"/><category term="Android"/><category term="OS Hacking"/><category term="SQL Injection"/><category term="Cryptography"/><category term="E-Books"/><category term="Twitter Hacking"/><category term="E-Mail Hacking"/><category term="Exploits"/><category term="LFI (Local File Inclusion)"/><category term="Wirless Hacking"/><category term="C/C++"/><category term="Cellphone Hacking"/><category term="Desktop Fun"/><category term="Vulnerabilities"/><category term="Website Hacking"/><category term="Windows 8"/><category term="Blogging Tips"/><category term="Miscellaneous"/><category term="RFI (Remote File Inclusion)"/><title type='text'>Convex-Coders</title><subtitle type='html'>A website which deals with Tip &#39;n&#39; Tricks upon HACKING, COMPUTERS, E-Mail HACKING and Cyber NEWS.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://convexcoders.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>129</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-2016459064516898536</id><published>2011-10-12T08:24:00.000+05:30</published><updated>2011-10-12T08:24:01.832+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Blogging Tips"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter Hacking"/><title type='text'>6 Tips For Best Usage of Twitter For Blogging Success</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;a href=&quot;http://cdn1.iconfinder.com/data/icons/PRACTIKA/128/twitter.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://cdn1.iconfinder.com/data/icons/PRACTIKA/128/twitter.png&quot; /&gt;&lt;/a&gt; Blogging is all about getting huge readers for your articles on your  blog. Twitter is the effective media, if you use it effectively. Twitter  has millions and millions of users, most of them use from their mobile  device. If you do magic on your article, then you can’t even think of  the amount of traffic which Twitter will send to you. Here are some of  the tips useful for achieving great success in your blogging career. &lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
Content&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
First of all your content matters. If your content is attractive and it  will solve someone’s problem or motivate someone to achieve something,  then that article will be shared on Social Medias like Facebook,  Twitter, Digg, Stumbleupon and others. So, keep in mind that here also  content is king.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Title&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Yes, if your title is catchy and attracts one’s eyes, then you will get  the traffic easily in Twitter.&amp;nbsp; Do not write boring and lengthy title,  use small, accurate and focused title for your posts. Do not use  different title for your articles, which are not related to your posts.  For example- do not use “here is the complete tips for you about writing  quality articles in your blog”. Instead of this write something like  “Best Tips to write quality articles in blogs”, which is simple and  tells everything about your article and catchy too. Isn’t it?&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; Timings: Do not write outdated topics in your blogs, which are already  finished its era. Yu should include new things in your articles and  title also. If you select the old topics to write about, then make it  extraordinary and use some of your unique ideas in that. Here I selected  the old topic, but isn’t it catchy? Isn’t it got some real tips?&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Hashtags&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Hashtags are symbolized as “#” before any word in twitter, which means  that, if you use #blog in your twitter post, all Twitter users who will  search #blog in twitter, will get your tweets. Similarly check which one  is latest trend in Twitter and use hashtags accordingly and make sure,  it is related to your article and title. This will get more followers  for your Twitter profile also.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;br /&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;Twitter Buttons&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
This is the important step. You should place Twitter button in your blog  in a good visible area. Your chance of getting your post tweeted is  more when reader finds your button in visible place. Before post and  after post is the right place to have the Tweet Button.&lt;/div&gt;If you follow all of these steps, then it will automatically brings you  traffic as well as your follower count will also increases. Is there  anything I left here? If you find any interesting fact and information  about using Twitter effectively for blogging, then please share in the  comments field below.&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/2016459064516898536'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/2016459064516898536'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/10/6-tips-for-best-usage-of-twitter-for.html' title='6 Tips For Best Usage of Twitter For Blogging Success'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-3731174370492720530</id><published>2011-10-06T20:16:00.000+05:30</published><updated>2011-10-06T20:16:33.100+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>GPU cracks 6 character password in 4 seconds</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img171.imageshack.us/img171/5701/freewarepasswordcracker.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;436&quot; src=&quot;http://img171.imageshack.us/img171/5701/freewarepasswordcracker.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;An&lt;b&gt; nVidia GeForce GT220&lt;/b&gt;  graphics card, which costs about £30, is capable of cracking strong  passwords in a matter of hours.&amp;nbsp;Security experts were able to crack a &amp;nbsp;6  character password in 12 seconds, a 7 character password in less than 5  minutes, and 8 character password in four hours.&lt;br /&gt;
&lt;i&gt;&quot;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;People have  worked out that the processing power of graphics cards, due to the  architecture of the chips, is more powerful than a normal processor for  doing certain tasks&lt;/span&gt;&lt;/i&gt;,&quot; said Neil Lathwood, IT director at UKFast.&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/3731174370492720530'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/3731174370492720530'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/10/gpu-cracks-6-character-password-in-4.html' title='GPU cracks 6 character password in 4 seconds'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-3999069552009863992</id><published>2011-10-01T21:56:00.000+05:30</published><updated>2011-10-01T21:56:37.448+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Nmap 5.61 TEST2 -  IPv6 OS detection Added</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img69.imageshack.us/img69/6765/nmap200jpgb1c6625b13079.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://img69.imageshack.us/img69/6765/nmap200jpgb1c6625b13079.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Nmap Added&amp;nbsp;IPv6 OS detection, CPE, 30 more scripts, and more features in latest release&amp;nbsp;Nmap 5.61 TEST2.&lt;br /&gt;
&lt;b&gt;Change Log for Nmap 5.61TEST2&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Added IPv6 OS detection system! The  new system utilizes many tests similar to IPv4, and also some  IPv6-specific ones that we found to be particularly effective. And it  uses a machine learning approach rather than the static classifier we  use for IPv4. We hope to move some of the IPv6 innovations back to our  IPv4 system if they work out well. The database is still very small, so  please submit anyfingerprints that Nmap gives you to the specified URL  (as long asyou are certain that you know what the target system  isrunning). Usage and results output are basically the same as withIPv4,  but we will soon document the internal mechanisms  athttp://nmap.org/book/osdetect.html, just as we have for IPv4. For  anexample, try &quot;nmap -6 -O scanme.nmap.org&quot;. [David, Luis]&lt;/li&gt;
&lt;li&gt;[NSE] Added 3 scripts, bringing the total to 246! You can learnmore  about them at http://nmap.org/nsedoc/. Here they are (authorslisted in  brackets):&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;+ lltd-discovery uses the Microsoft LLTD protocol to discover hostson a local network. [Gorjan Petrovski]&lt;/li&gt;
&lt;li&gt;+ ssl-google-cert-catalog queries Google&#39;s Certificate Catalog  forthe SSL certificates retrieved from target hosts. [Vasiliy Kulikov]&lt;/li&gt;
&lt;li&gt;+ quake3-info extracts information from a Quake3-like gameserver. [Toni Ruottu]&lt;/li&gt;
&lt;/ul&gt;&lt;li&gt;Improved AIX support for raw scans. This includes some  patchesoriginally written by Peter O&#39;Gorman and Florian Schmid. It  alsoinvolved various build fixes found necessary on AIX 6.1 and 7.1.  Seehttp://nmap.org/book/inst-other-platforms.html. [David]&lt;/li&gt;
&lt;li&gt;[NSE] Moved our brute force authentication cracking scripts(*-brute)  from the &quot;auth&quot; category into a new &quot;brute&quot;category. Nmap&#39;s brute force  capabilities have grown tremendously!You can see all 32 of them  athttp://nmap.org/nsedoc/categories/brute.html. It isn&#39;t clearwhether  dns-brute should be in the brute category, so for now itisn&#39;t. [Fyodor]&lt;/li&gt;
&lt;li&gt;Made the interface gathering loop work on Linux when an  interfaceindex is more than two digits in /proc/sys/if_inet6. Joe  McEacherntracked down the problem and provided the fix.&lt;/li&gt;
&lt;li&gt;[NSE] Fixed a bug in dns.lua: ensure that dns.query() always return  two values(status, response) and replaced the workaround in  asn-query.nse by the properuse. [Henri]&lt;/li&gt;
&lt;li&gt;[NSE] Made irc-info.nse handle the case where the MOTD is missing.Patch by Sebastian Dragomir.&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;a href=&quot;http://nmap.org/download.html&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Download&amp;nbsp;Nmap 5.61 TEST2&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/3999069552009863992'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/3999069552009863992'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/10/nmap-561-test2-ipv6-os-detection-added.html' title='Nmap 5.61 TEST2 -  IPv6 OS detection Added'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-348692819029490401</id><published>2011-10-01T21:52:00.000+05:30</published><updated>2011-10-01T21:52:11.705+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><title type='text'>Samsung Galaxy S II (AT&amp;T) trusted pattern lock Security Bypassed</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img171.imageshack.us/img171/531/bgrattsamsunggalaxysii.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;http://img171.imageshack.us/img171/531/bgrattsamsunggalaxysii.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Major security flaw found in AT&amp;amp;T&#39;s upcoming Samsung Galaxy S II  device. Guys at BGR noticed that the information on the upcoming  AT&amp;amp;T version of the Samsung Galaxy S II isn&#39;t so safe behind a once  trusted pattern lock, and that it can quite simply be bypassed.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;All you have to do :&lt;/b&gt; Wake the device using the lock key, then let  the screen time out, then wake it again with the lock key and you can  access all the data.&lt;br /&gt;
&lt;br /&gt;
AT&amp;amp;T&#39;s Version of Samsung Galaxy S II is confirmed to have this  security flaw, but the Sprint version or other does not suffer from  this.&lt;b&gt;Even I just check my own&amp;nbsp;Samsung Galaxy S II (Indian Version), Yeah - ITS SAFE :)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;VIDEO DEMO:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/V9tXDLyeoBE?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/348692819029490401'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/348692819029490401'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/10/samsung-galaxy-s-ii-at-trusted-pattern.html' title='Samsung Galaxy S II (AT&amp;T) trusted pattern lock Security Bypassed'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-8594374319000797431</id><published>2011-09-29T14:46:00.001+05:30</published><updated>2011-09-29T14:51:40.432+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="SEO Tips"/><title type='text'>SEO : Boosting Your Crawl Rate</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyeg26xSLF3vL-dpG57kErY2xEjQgcwszXq32kex8ya_yjkfws7RpV4ccI4K6lcofNT2Kqx5xreeIRwozcwswCNaz4TiXr7OMB7bYf6q1vGaEUU4nE0gwhgqYcxhexBZznuIfHZ6wESmw/s1600/black-hat-seo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;146&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyeg26xSLF3vL-dpG57kErY2xEjQgcwszXq32kex8ya_yjkfws7RpV4ccI4K6lcofNT2Kqx5xreeIRwozcwswCNaz4TiXr7OMB7bYf6q1vGaEUU4nE0gwhgqYcxhexBZznuIfHZ6wESmw/s200/black-hat-seo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The success of an SEO campaign depends  on how fast changes to the website are indexed. This is particularly  true when making small changes on websites which already have an  established ranking. If the site only gets crawled once every two weeks,  this can slow down the process significantly.&lt;br /&gt;
Fortunately, there are strategies you can use to increase the crawl rate  of your site, as a result increasing your rankings. If you site is  regularly crawled, it means more of your pages will appear in the search  engine index.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;The following are five vital things you could do to help increase the crawl rate of your site.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Increase Your Page-rank&lt;/span&gt;&lt;/b&gt;&lt;b&gt;:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Links are vital not only for increased rankings, but also for increasing  your website’s pagerank. Many search engine crawl patterns are  determined by pagerank. Pages with higher PR are usually crawled  regularly. However, this is not the sole factor. While building links to  your website, there are several other things you need to work on.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Smaller And Faster Pages&lt;/span&gt;:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Search engines need to crawl numerous pages, and therefore crawling uses  up a lot of resources. If you can decrease the size of your pages and  increase the loading speed, you are likely to benefit from deeper and  increased crawling.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Servers:&lt;/span&gt;&lt;/b&gt; &lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
Make sure your server is reliable. You would not want your website to be  unavailable when search engines visit. This will have an adverse effect  on the frequency of search engine visits and may also lower your  rankings because it results in a bad user experience.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Fresh Content&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Blogs get indexed very often because they regularly provide a lot of  updated content. This offers search engines new content to index every  time they visit. If your site has a static page which you would want to  remain the same, then you should think of how you can add regularly  updated content to the website. You could add new content in the form of  news and articles, a twitter feed, latest posts, or any other kind of  update.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Duplication&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
One major issue that many sites deal with is the adverse effects of  duplication. This can result in much search engine resources being used  up on unnecessary pages, thus leading to ranking and indexation issues.  If you are experiencing duplication problems on your website, you need  to deal with them as soon as possible.&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Implementing these strategies will increase the crawl rate for your site. &lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/8594374319000797431'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/8594374319000797431'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/seo-boosting-your-crawl-rate.html' title='SEO : Boosting Your Crawl Rate'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyeg26xSLF3vL-dpG57kErY2xEjQgcwszXq32kex8ya_yjkfws7RpV4ccI4K6lcofNT2Kqx5xreeIRwozcwswCNaz4TiXr7OMB7bYf6q1vGaEUU4nE0gwhgqYcxhexBZznuIfHZ6wESmw/s72-c/black-hat-seo.jpg" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-5368087036240617306</id><published>2011-09-27T20:23:00.000+05:30</published><updated>2011-09-27T20:23:21.049+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="SEO Tips"/><title type='text'>Free SEO Report For Your Website</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;color: maroon;&quot;&gt;&lt;a href=&quot;http://seorush.com/&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: blue;&quot;&gt; SEOrush&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt; is a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;one touch&lt;/span&gt; resource which provides you a FREE &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;SEO report&lt;/span&gt; for your URL or a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;competitors&lt;/span&gt; URL. The report &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;will return&lt;/span&gt;  On Page SEO and Off Page SEO as well as social presence, indexed pages,  validation, meta information, various ranks and standard domain  information.&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img33.imageshack.us/img33/5080/seorush.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;80&quot; src=&quot;http://img33.imageshack.us/img33/5080/seorush.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;&lt;span style=&quot;color: maroon;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: maroon;&quot;&gt;SEOrush is as easy as entering the URL in the search box at the top of the screen and clicking the “Go!” button.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: maroon;&quot;&gt;After giving it a few seconds, you will find the SEO results you will need to get an idea of the improvements you need to make.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: maroon;&quot;&gt;The report can be beneficial as it may  help webmasters improve their sites performance in the SEO aspects, as  well as giving the site more exposure and to gain more traffic. It can  also be used to research competitors in your niche and how well they are doing in comparison.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: maroon;&quot;&gt;Link : &lt;a href=&quot;http://seorush.com/index.php&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: blue;&quot;&gt;SEORUSH&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/5368087036240617306'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/5368087036240617306'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/free-seo-report-for-your-website.html' title='Free SEO Report For Your Website'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-5136058203346801229</id><published>2011-09-27T20:09:00.000+05:30</published><updated>2011-09-27T20:09:55.582+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 8"/><title type='text'>Download Windows 8 Developer Preview</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Microsoft has released its Windows 8 Developer Preview operating system, for PCs and tablets, to the public as a &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;free download&lt;/span&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;Microsoft has made available three different versions of Windows 8 &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;for download&lt;/span&gt;  (two versions built for 64-bit systems which use new processors and can  make use of more RAM, versus older 32-bit PCs that use earlier chips  and less memory), which all show up as an ISO file when downloaded.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;span id=&quot;more-3456&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img36.imageshack.us/img36/9214/windows8download.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;252&quot; src=&quot;http://img36.imageshack.us/img36/9214/windows8download.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;strong&gt;Official Microsoft Download Links&lt;/strong&gt;:-&lt;/span&gt;&lt;/h2&gt;&lt;h3&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://wdp.dlws.microsoft.com/WDPDL/9B8DFDFF736C5B1DBF956B89D8A9D4FD925DACD2/WindowsDeveloperPreview-64bit-English-Developer.iso&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Windows Developer Preview with Developer tools English, 64-bit (x64)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;h3&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://wdp.dlws.microsoft.com/WDPDL/9B8DFDFF736C5B1DBF956B89D8A9D4FD925DACD2/WindowsDeveloperPreview-64bit-English.iso&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Windows Developer Preview without Developer tools English, 64-bit (x64)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;h3&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;http://wdp.dlws.microsoft.com/WDPDL/9B8DFDFF736C5B1DBF956B89D8A9D4FD925DACD2/WindowsDeveloperPreview-32bit-English.iso&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Windows Developer Preview English, 32-bit (x86)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/5136058203346801229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/5136058203346801229'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/download-windows-8-developer-preview.html' title='Download Windows 8 Developer Preview'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-8463095952759992255</id><published>2011-09-27T14:37:00.000+05:30</published><updated>2011-09-27T14:37:24.339+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>Download : Google+ Android Application</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color: black;&quot;&gt;Anroid&lt;/span&gt;&lt;/strong&gt; has lanched&amp;nbsp; &quot;&lt;b&gt;Google +&lt;/b&gt;&quot;&amp;nbsp; &lt;strong&gt;&lt;span style=&quot;color: black;&quot;&gt;Android Application&lt;/span&gt;&lt;/strong&gt; for&amp;nbsp; &quot;Google +&quot; Lover .So they can also access Google + from there Android Mobile.This &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;application&lt;/span&gt; will work in 2.1 and greater version.Check it’s features.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img204.imageshack.us/img204/2512/downloadgoogleandroidap.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://img204.imageshack.us/img204/2512/downloadgoogleandroidap.jpg&quot; width=&quot;192&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h3&gt;&lt;span style=&quot;color: black;&quot;&gt;Features :- &lt;/span&gt;&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;Circles let &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;you share&lt;/span&gt; the right things with just the right people.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;Stream is where you can get updates from your circles or see what people are saying about things nearby.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;Instant Upload automatically uploads videos and photos to your own private &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;album&lt;/span&gt; in the cloud, to make sharing a snap.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;Huddle is super-fast group messaging for everyone in your circles.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;h3&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://market.android.com/details?id=com.google.android.apps.plus&quot; target=&quot;_blank&quot; title=&quot;Download Google+ Android Application &quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Download&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/8463095952759992255'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/8463095952759992255'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/download-google-android-application.html' title='Download : Google+ Android Application'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-981943360849220817</id><published>2011-09-27T13:27:00.000+05:30</published><updated>2011-09-27T13:27:38.899+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><title type='text'>Angry Birds Shortcut Keys For Windows</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;b&gt;&lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;Angry Birds&lt;/span&gt;&lt;/b&gt; is world most&amp;nbsp;popular&amp;nbsp;game . In this post i have listed some shortcut key of Angry Birds Game. If you want to &lt;strong&gt;&lt;a href=&quot;http://shareittips.com/4-tech-stuffs/angry-birds/angry-birds-rio-1-2-2-full-version-download/&quot; target=&quot;_blank&quot; title=&quot;Download Full Version of Angry Bird Rio &quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Download Full Version of Angry Bird Rio Click Here&amp;nbsp;&lt;/span&gt;&lt;/a&gt;.&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;strong&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img577.imageshack.us/img577/2500/angrybirdsshortcutkeysf.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://img577.imageshack.us/img577/2500/angrybirdsshortcutkeysf.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&lt;strong&gt;&lt;span id=&quot;more-3466&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;clear: right; color: black; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;Shortcut Keys :-&lt;/span&gt;&lt;/b&gt; &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;Scrollwheel – Zoom in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;P – Pause&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;R – Restart the current level&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;S – Sounds Mute and unmute&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: black;&quot;&gt;Escape – sidebar menu&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div&gt;&lt;i&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;If you Know More Shortcut key Do Comment.&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/981943360849220817'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/981943360849220817'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/angry-birds-shortcut-keys-for-windows.html' title='Angry Birds Shortcut Keys For Windows'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-9009922247563873025</id><published>2011-09-25T20:01:00.000+05:30</published><updated>2011-09-25T20:01:58.270+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><title type='text'>HTTPS SSL encryption Vulnerable To Crypto Attack</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1NytMcg8SBMSW2Du6pVWv3U7YTChFEY2gIjcL6e1ed6DcdjvG6PzDwo-9eEw0lwjCXfKyhipI3xqQwHS1pVdDxTkm0QhPYTk93dk_zKOwbT0Vg49GDltK0Pa5nN6m5K57szP4Nka5Z5c/s1600/httpSSl.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;576&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1NytMcg8SBMSW2Du6pVWv3U7YTChFEY2gIjcL6e1ed6DcdjvG6PzDwo-9eEw0lwjCXfKyhipI3xqQwHS1pVdDxTkm0QhPYTk93dk_zKOwbT0Vg49GDltK0Pa5nN6m5K57szP4Nka5Z5c/s640/httpSSl.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;The secure sockets layer (SSL) and transport layer security (TLS)  encryption protocol, used by millions of websites to secure Web  communications via HTTPS, is vulnerable to being decrypted by attackers.&lt;br /&gt;
&lt;br /&gt;
Researchers have discovered a serious weakness in virtually all websites  protected by the secure sockets layer protocol that allows attackers to  silently decrypt data that&#39;s passing between a webserver and an  end-user browser.&lt;br /&gt;
&lt;br /&gt;
Juliano Rizzo and Thai Duong say the vulnerability compromises TLS  (Transport Layer Security) 1.0, the encryption mechanism that secures  Web sites accessed using HTTPS (Secure Hypertext Transfer Protocol). TLS  is the successor to SSL (Secure Sockets Layer) and is widely used at  financial sites. Companies, including Google, Facebook, and Twitter, are  urging the wider use of TLS on the Web.&lt;br /&gt;
&lt;br /&gt;
The exploit – demonstrated with a tool called &lt;b&gt;BEAST&lt;/b&gt; – targets a flaw that could leave transactions open to attack and is being taken seriously by online payments firms.“&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;We have got a team of security people and it is always working on updates and upgrades and they are looking into this already,&lt;/span&gt;&lt;/i&gt;” a PayPal spokesperson told PC Pro. “&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;The details are still to be revealed, but the security people are trying to get a headstart on making sure this is kept secure.&lt;/span&gt;&lt;/i&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
BEAST requires attackers to gain a man-in-the-middle position. Most of  the time this means that they need to be on the same network as their  targets so they can intercept browser requests.BEAST has two components.  One contains code that must be loaded into the victim&#39;s web browser and  the second one captures and decrypts HTTPS session cookies. The  researchers claim that they can decrypt any secure session cookie in  five minutes on average.&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/9009922247563873025'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/9009922247563873025'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/https-ssl-encryption-vulnerable-to.html' title='HTTPS SSL encryption Vulnerable To Crypto Attack'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1NytMcg8SBMSW2Du6pVWv3U7YTChFEY2gIjcL6e1ed6DcdjvG6PzDwo-9eEw0lwjCXfKyhipI3xqQwHS1pVdDxTkm0QhPYTk93dk_zKOwbT0Vg49GDltK0Pa5nN6m5K57szP4Nka5Z5c/s72-c/httpSSl.jpg" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-643776926240323585</id><published>2011-09-23T14:11:00.002+05:30</published><updated>2011-09-23T14:11:28.433+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><title type='text'>50000 WordPress Sites infected with spam</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyMSdxd8Gre5sBS0U1bmVznPpUyfTJIdPyh13RWm8CtXekEi0fLodFGeUfhvhpYPbn_Am3alV77QmvkeL-7mFuIR32de_9mokiV9eJe_mUQOSkzHvF6Q6_B9EG_KzqDDGvePJ6X4ys39M/s1600/spam-wplinks-650x399.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyMSdxd8Gre5sBS0U1bmVznPpUyfTJIdPyh13RWm8CtXekEi0fLodFGeUfhvhpYPbn_Am3alV77QmvkeL-7mFuIR32de_9mokiV9eJe_mUQOSkzHvF6Q6_B9EG_KzqDDGvePJ6X4ys39M/s1600/spam-wplinks-650x399.png&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;The attack consists of contacting the domain &lt;a href=&quot;http://wplinksforwork.com/&quot;&gt;wplinksforwork.com&lt;/a&gt;  to get a list of links to be displayed on the compromised sites.  However, that domain has been down for the last few days and all the  sites compromised. These sites supposed to be compromised. Most of the  hacked sites had outdated versions of WordPress installed.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Infected sites have following message at Footer :&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;Warning:  file_get_contents(http://wplinksforwork.com/56132..  47509328/p.php?host=… failed to open stream: php_network_getaddresses:  getaddrinfo failed: Name or service not known in ..&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/643776926240323585'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/643776926240323585'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/50000-wordpress-sites-infected-with.html' title='50000 WordPress Sites infected with spam'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyMSdxd8Gre5sBS0U1bmVznPpUyfTJIdPyh13RWm8CtXekEi0fLodFGeUfhvhpYPbn_Am3alV77QmvkeL-7mFuIR32de_9mokiV9eJe_mUQOSkzHvF6Q6_B9EG_KzqDDGvePJ6X4ys39M/s72-c/spam-wplinks-650x399.png" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-108519038948509139</id><published>2011-09-23T14:09:00.000+05:30</published><updated>2011-09-23T14:09:47.987+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>BruCON Agnitio workshop Slides and Video Demonstration - Download</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP9FL643xG7jz-mHocFMByv2x5y3n8Lcp_H-fF_KQXCMqGAQ5kCX6nhY5kKrxRUqVqGRn2iqOG7vMo7caLIc1SMPi2JwlrOzVF9tUYxw-ZZ91bh5eRJnK3PGEl3zr0Q6HPYl6_SbnWJ6U/s1600/Untitled.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;480&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP9FL643xG7jz-mHocFMByv2x5y3n8Lcp_H-fF_KQXCMqGAQ5kCX6nhY5kKrxRUqVqGRn2iqOG7vMo7caLIc1SMPi2JwlrOzVF9tUYxw-ZZ91bh5eRJnK3PGEl3zr0Q6HPYl6_SbnWJ6U/s640/Untitled.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Workshop by&amp;nbsp;David Rook (&lt;a href=&quot;http://www.securityninja.co.uk/&quot;&gt;Security Ninja&lt;/a&gt;) at BruCON 2011 in Belgium. You can Download Slide from &lt;a href=&quot;http://www.multiupload.com/WR7G0LI94K&quot;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Required for the Agnitio hands on demos:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;A 32bit Windows Operating System (XP or 7 preferably – VM will be fine)&lt;/li&gt;
&lt;li&gt;.NET framework 3.5 installed&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://sourceforge.net/projects/agnitiotool/&quot;&gt;Agnitio v2.0&lt;/a&gt; installed&lt;/li&gt;
&lt;li&gt;Download the &lt;a href=&quot;https://github.com/denimgroup/Pandemobium&quot;&gt;Pandemobium Android and iOS&lt;/a&gt; source code&lt;/li&gt;
&lt;li&gt;Download the selected &lt;a href=&quot;http://www.exploit-db.com/exploits/17739/&quot;&gt;vulnerable open source application&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Optional&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
In addition to the list above the following things are optional depending on how hands on you want to be:&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Internet connection to download an application from the Android market place&lt;/li&gt;
&lt;li&gt;Eclipse IDE installed&lt;/li&gt;
&lt;li&gt;Android SDK installed&lt;/li&gt;
&lt;li&gt;Android Debug Bridge (adb) installed, this should be installed as part of the SDK install&lt;/li&gt;
&lt;li&gt;An AVD configured with the Android market place app installed (instructions here)&lt;/li&gt;
&lt;li&gt;I think you can also use a rooted Android device if you don’t want to use the emulator&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Workshop format&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;A quick look at static analysis and the strengths and weaknesses of humans and software&lt;/li&gt;
&lt;li&gt;What is Agnitio and why do I think checklists are a vital component of security code reviews&lt;/li&gt;
&lt;li&gt;Some examples of what can go wrong if you don’t use checklists to find and remove simple flaws&lt;/li&gt;
&lt;li&gt;Demos/hands on: using checklists in Agnitio to review source code, produce reports and metrics&lt;/li&gt;
&lt;li&gt;Demos/hands on: how to customise your Agnitio installation&lt;/li&gt;
&lt;li&gt;A look at mobile (Android and iOS) application security and how analysis is currently done&lt;/li&gt;
&lt;li&gt;Demo/hands on: using the mobile specific rule sets in the Agnitio static analysis module&lt;/li&gt;
&lt;li&gt;Demo/hands on: downloading an app from the marketplace and decompiling it using Agnitio&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/25Uhq7fUffQ?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/108519038948509139'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/108519038948509139'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/brucon-agnitio-workshop-slides-and.html' title='BruCON Agnitio workshop Slides and Video Demonstration - Download'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP9FL643xG7jz-mHocFMByv2x5y3n8Lcp_H-fF_KQXCMqGAQ5kCX6nhY5kKrxRUqVqGRn2iqOG7vMo7caLIc1SMPi2JwlrOzVF9tUYxw-ZZ91bh5eRJnK3PGEl3zr0Q6HPYl6_SbnWJ6U/s72-c/Untitled.png" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-5319836138382856477</id><published>2011-09-21T18:00:00.000+05:30</published><updated>2011-09-21T18:00:26.746+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><title type='text'>iPhone Skype XSS Vulnerability Lets Hackers Steal Phonebook [Video]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilEw0LOUo_ytSWP-Z-lXjV9WZeouSbmbpON9txJGnWOt3izkNFLtk8qS6lR_EkCTzMroHVADzgLsdvl0mwAWksnugm0W1wH64hGinbt338MTOM8mPs2IfOPbWAYvX3wQJPBXH0eJn6jkk/s1600/skype-xss-exploit.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;484&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilEw0LOUo_ytSWP-Z-lXjV9WZeouSbmbpON9txJGnWOt3izkNFLtk8qS6lR_EkCTzMroHVADzgLsdvl0mwAWksnugm0W1wH64hGinbt338MTOM8mPs2IfOPbWAYvX3wQJPBXH0eJn6jkk/s640/skype-xss-exploit.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;A bug in the latest version of Skype for iPhone and iPod  touch makes its users vulnerable to having their address book stolen  just by viewing a specially crafted message, says AppSec Consulting  security researcher Phil Purviance.&lt;br /&gt;
&lt;br /&gt;
The problem is made more exploitable by the way Skype uses the  embeddable WebKit browser; Skype developers have set the URI scheme for  the embedded browser to &quot;file://&quot;. This error allows an attacker to  access the file system and read any file that the app would be allowed  to read by the iOS application sandbox. One file that every iOS  application has access to is the user&#39;s SQLlite AddressBook database. In  a demonstration of the bugs, Phil Purviance, AppSec Consulting security  researcher, &lt;a href=&quot;https://superevr.com/blog/2011/xss-in-skype-for-ios/&quot;&gt;showed&lt;/a&gt; how it was possible to extract the iPhone address book using the vulnerabilities.&lt;/div&gt;&lt;br /&gt;
Skype is aware of the issue and is working on a fix. “We are working  hard to fix this reported issue in our next planned release, which we  hope to roll out imminently,” Skype said in a statement.&lt;/div&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;object width=&quot;320&quot; height=&quot;266&quot; class=&quot;BLOGGER-youtube-video&quot; classid=&quot;clsid:D27CDB6E-AE6D-11cf-96B8-444553540000&quot; codebase=&quot;http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0&quot; data-thumbnail-src=&quot;http://2.gvt0.com/vi/Ou_Iir2SklI/0.jpg&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/Ou_Iir2SklI&amp;fs=1&amp;source=uds&quot; /&gt;&lt;param name=&quot;bgcolor&quot; value=&quot;#FFFFFF&quot; /&gt;&lt;embed width=&quot;320&quot; height=&quot;266&quot;  src=&quot;http://www.youtube.com/v/Ou_Iir2SklI&amp;fs=1&amp;source=uds&quot; type=&quot;application/x-shockwave-flash&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;Simple solution: &lt;/b&gt;Don&#39;t open text messages in the chat window, and check for a really quick update.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/5319836138382856477'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/5319836138382856477'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/iphone-skype-xss-vulnerability-lets.html' title='iPhone Skype XSS Vulnerability Lets Hackers Steal Phonebook [Video]'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilEw0LOUo_ytSWP-Z-lXjV9WZeouSbmbpON9txJGnWOt3izkNFLtk8qS6lR_EkCTzMroHVADzgLsdvl0mwAWksnugm0W1wH64hGinbt338MTOM8mPs2IfOPbWAYvX3wQJPBXH0eJn6jkk/s72-c/skype-xss-exploit.jpg" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-5483193799281845085</id><published>2011-09-20T15:42:00.000+05:30</published><updated>2011-09-20T15:42:33.312+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><title type='text'>Automated Skype calls spreading fake anti-virus warning</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2avsUhTZGrK_EVeP951OvKbtQK4co988zNzjq0TwIaFDSh66LK9_s6zUUoneOEcq8qx_HKG676xhRRIl3P5B_fBd9aaX0XKU5S_qwMOZHDzjhGxkh8wl4_bgdUpS0cNf2LagXpsFq-PI/s1600/skype-scam-fakeav.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;492&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2avsUhTZGrK_EVeP951OvKbtQK4co988zNzjq0TwIaFDSh66LK9_s6zUUoneOEcq8qx_HKG676xhRRIl3P5B_fBd9aaX0XKU5S_qwMOZHDzjhGxkh8wl4_bgdUpS0cNf2LagXpsFq-PI/s640/skype-scam-fakeav.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;Automated Skype calls spreading fake anti-virus warning,  where an automated message (what I like to call a &quot;Digital Dorothy&quot;)  warns you in a semi-robotic voice that your computer&#39;s security is not  up-to-date.&lt;br /&gt;
&lt;br /&gt;
&quot;Attention: this is an automated computer system alert. Your computer  protection service is not active. To activate computer protection, and  repair your computer, go to [LINK],&quot; says the robotic voice during a  prerecorded message.&lt;br /&gt;
&lt;br /&gt;
The offered link takes the most gullible and curious ones to a page that  shows the typical &quot;Computer protection inactive. Scanning… Viruses  found!&quot; message that is meant to convince them to fork over a decent  amount of money - in this case, $19.95 - in order to get the offered  protection.Not content with the money, they also ask for their personal  information. If you weren&#39;t aware of fake anti-virus (also known as  scareware) scams like this you might well be worried enough to visit the  website referred to in the message, where it will pretend to scan your  computer&#39;s security.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;320&#39; height=&#39;266&#39; src=&#39;https://www.youtube.com/embed/Eq0nVvrvkPQ?feature=player_embedded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/5483193799281845085'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/5483193799281845085'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/automated-skype-calls-spreading-fake.html' title='Automated Skype calls spreading fake anti-virus warning'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2avsUhTZGrK_EVeP951OvKbtQK4co988zNzjq0TwIaFDSh66LK9_s6zUUoneOEcq8qx_HKG676xhRRIl3P5B_fBd9aaX0XKU5S_qwMOZHDzjhGxkh8wl4_bgdUpS0cNf2LagXpsFq-PI/s72-c/skype-scam-fakeav.jpg" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-6043357983386667824</id><published>2011-09-17T21:01:00.000+05:30</published><updated>2011-09-17T21:01:25.185+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="SEO Tips"/><title type='text'>Blackhat Seo: What is cloaking ?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijjzOX5H4WdrrsLKoNPjFg0b2I4ywqadQ7eeSMZwyzcfkadBRmgPxCoG_uCuMI3B8Uyg-wTKVnL9aqKZoofbKDS8iyk3SNO89jyOcrB6g7NMq4kjNlxt6HVcpe0w_4g-P-FiG8AP6GZvw/s1600/Seo-logo1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijjzOX5H4WdrrsLKoNPjFg0b2I4ywqadQ7eeSMZwyzcfkadBRmgPxCoG_uCuMI3B8Uyg-wTKVnL9aqKZoofbKDS8iyk3SNO89jyOcrB6g7NMq4kjNlxt6HVcpe0w_4g-P-FiG8AP6GZvw/s1600/Seo-logo1.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;There are various Blackhat Seo methods to get high traffic to your website, one of them is cloaking.&lt;br /&gt;
Cloaking is a search engine optimization technique used for presentation  for different forms of content to various search engines and different  presentations to the users. This is a deceptive method for hood winking  search engines for the purposes of getting the desired ranks for desired  keywords.&lt;br /&gt;
&lt;br /&gt;
When a user requests a particular web page from the site then site  responds to the user with the normal web page of the site but when the  same request is made by the search engine spiders then instead of the  site page another page that has been specially designed for the search  engine spiders is returned and the normal site page is hidden from the  search engine spiders. Such a page is said to be clocked.&lt;br /&gt;
&lt;br /&gt;
Cloaking is resorted to for the purposes of showing contents based on  the request of IP address as well as the user agent HTTP header of the  user. A user identifies search engine is exhibited a minutely prepared  as well as optimized website for the purposes of ranking for desired  keywords. If the user is non-search engine real websites content are  shown to them.&lt;br /&gt;
&lt;br /&gt;
The main purpose of cloaking is to hide the code of high ranking pages  from visitors and users so that the content cannot be stolen by anybody.  And to provide search engine spiders with pages which are highly  optimized.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcoeMdg4CwkuLL9W3Fk0YfTFFNTQVdO3jL2Jck_dWakQg9383FCoXs0NNsr5-hAUZfRrW1qvtO1pbeRmy4wWoAyITcejD5vqtnw-Mv0rPopNfcCcCYpA9EmZr3n9J8zNURtfqoBqLjloQ/s1600/Cloaking-SEO-Technique.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcoeMdg4CwkuLL9W3Fk0YfTFFNTQVdO3jL2Jck_dWakQg9383FCoXs0NNsr5-hAUZfRrW1qvtO1pbeRmy4wWoAyITcejD5vqtnw-Mv0rPopNfcCcCYpA9EmZr3n9J8zNURtfqoBqLjloQ/s320/Cloaking-SEO-Technique.jpg&quot; width=&quot;303&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;There are certain search engines which consider cloaking as spam and  this sort of behaviour is against the edifice of good guidelines. Google  webmaster cloaking methods as well as guidelines spell out the  following.&lt;br /&gt;
• Cloaking for JavaScript – If any user uses enabled JavaScript it is  shown one version while if the same user is using turned off JavaScript  then it shows another version of a website.&lt;br /&gt;
• Header cloaking for HTTP referrer – If any user coming from a  particular website they will be presented a cloaked version of a website  based on the HTTP referrer.&lt;br /&gt;
• Cloaking for IP address – Cloaking system checks the IP address of the  requestor. If the IP address of a search engine’s spider, the engine  page will return. Cloaking uses IP address delivery, however so do other  things such as geographical location for location based content.  Cloaking uses IP address delivery, but IP address delivery is not itself  cloaking.&lt;br /&gt;
• Cloaking for user agent – Based on user agent different versions of  websites are delivered. If a search engine determines a script to gain  access to a website based on the signature of its user agent it will  show its cloak version of the website.&lt;br /&gt;
• Header cloaking for HTTP accept-language – It enables to show various  language versions of a website without asking the users web browser  language.&lt;br /&gt;
• Auto redirecting – Auto redirecting is also called as poor man’s  cloaking. But it is not cloaking at all. This method is the same page is  returning to all requestors, and does not make difference between  search engine spiders and people.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000;&quot;&gt;Working of Cloaking&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Every website contains one or more ordinary web pages. If we want a page  to be cloaked in the website then we need to create another page for  that particular page and is designed in such a way that it is ranked  high in the search engines. If we are taking into consideration more  than one search engine then a page is created for each search engine.  This is done because every search engine use different algorithms and  different criteria for the ranking of the web pages. So pages are  designed by taken into consideration these criteria.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-LY5rWoPo9RZW6ZcAAzf1muyasyDG7QOJufW8bDB_7hNYV2eljF2fCQ1sjY4-q3A0QxkvwXjPhLokx_SVWS6fnjfA0srNONcS5FOC_ae7ZR5RVa39sYgHIGCSf8l2_iUy9_LjNcfY6Jc/s1600/20100103-cloaking.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-LY5rWoPo9RZW6ZcAAzf1muyasyDG7QOJufW8bDB_7hNYV2eljF2fCQ1sjY4-q3A0QxkvwXjPhLokx_SVWS6fnjfA0srNONcS5FOC_ae7ZR5RVa39sYgHIGCSf8l2_iUy9_LjNcfY6Jc/s320/20100103-cloaking.gif&quot; width=&quot;276&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
The pages designed for search engines are generally different from the  normal content page. Sometimes a page ranks high in a particular search  engine if it is stuffed with keywords. So such a page is created for the  search engines.&lt;br /&gt;
Whenever a web page of the site is requested, a programme embedded in  the site detects who is making the request. If the request is made by  the normal visitor then the normal web page of the site is returned but  if the search engine spider is requesting for the web page then the  special page designed for search engine is returned. So in this way  search engine spiders can never know the normal website page and the  normal user can never know the page designed for search engines.&lt;br /&gt;
Cloaking is ethical&lt;br /&gt;
There are various views of people. Many people think that cloaking is a  unethical way for reaching top position in search engine rankings. But  this is not true. According to these people it is wrong because search  engine is ranking the pages according to what they believe it to be and  not according to what it actually is. That idea is purely a matter of  principle, and nothing at all to do with ethics.&lt;br /&gt;
&lt;br /&gt;
But it can be considered ethical n the way if the ranking is based on  the topic or content the visitors will see the page listed in the search  results and by clicking this if they get to the correct result then it  is purely ethical. it doesn&#39;t matter how the page came to be ranked in  that position but what matters is that the end result should be correct  and ranking should be based according to the topic.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000;&quot;&gt;Cloaking can be used unethically&lt;/span&gt;&lt;/b&gt;,  by sending people to sites and topics that they did not expect to go to  when clicking on a listing in the search results, and that is an  excellent reason to be against the misuse of cloaking, but it doesn&#39;t  mean that cloaking is unethical. It just means that, like many other  things, it has unethical uses.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000;&quot;&gt;Conclusion&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Any type of cloaking with fraudulent purposes may result in prohibition  of the search engines which makes you cautious when you are utilizing  the services. Frequently, search engines hold cloaked pages by frequent  visiting of search engines in timely intervals. The holders of the  websites who use cloaking for securing their search engine rankings not  to be taken unaware sooner or later. Supposing this process is  identified web pages may be deleted temporarily or permanently from the  list of various search engines.&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/6043357983386667824'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/6043357983386667824'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/blackhat-seo-what-is-cloaking.html' title='Blackhat Seo: What is cloaking ?'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijjzOX5H4WdrrsLKoNPjFg0b2I4ywqadQ7eeSMZwyzcfkadBRmgPxCoG_uCuMI3B8Uyg-wTKVnL9aqKZoofbKDS8iyk3SNO89jyOcrB6g7NMq4kjNlxt6HVcpe0w_4g-P-FiG8AP6GZvw/s72-c/Seo-logo1.JPG" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-7716001051760154748</id><published>2011-09-17T20:45:00.000+05:30</published><updated>2011-09-17T20:45:08.340+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Desktop Fun"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><title type='text'>How to get your computer to have an FBI login screen</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilaDnu_hUQiXz5KnrpV8_G0RLaCW4D__YbrR8U0fixHDT7dbYIxf3mzxht9PkTelYU4O5nYpoLB-57SnuOo1TP0sEZJo2lzemVu462-yHFXE9QDqcSNooQcaStdDwcawjetm6HsiPr6HQ/s1600/FBI.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;220&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilaDnu_hUQiXz5KnrpV8_G0RLaCW4D__YbrR8U0fixHDT7dbYIxf3mzxht9PkTelYU4O5nYpoLB-57SnuOo1TP0sEZJo2lzemVu462-yHFXE9QDqcSNooQcaStdDwcawjetm6HsiPr6HQ/s400/FBI.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
1)&lt;b&gt; Download LogonStudios&lt;/b&gt; (&lt;i&gt;It&#39;s Vista version but if you have Windows 7 it works&lt;/i&gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;codeheader&quot;&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;code&quot;&gt;&lt;pre style=&quot;display: inline; margin-top: 0;&quot;&gt;&lt;i&gt;http://www.megaupload.com/?d=I8DIQ2YN&lt;/i&gt;&lt;/pre&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b style=&quot;color: black;&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;For xp users:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;codeheader&quot;&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;code&quot;&gt;&lt;pre style=&quot;display: inline; margin-top: 0;&quot;&gt;&lt;i&gt;http://www.stardock.com/products/logonstudio/downloads.asp&lt;/i&gt;&lt;/pre&gt;&lt;/div&gt;&lt;br /&gt;
2) You can download the &lt;b&gt;FBI&lt;/b&gt; file here&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;codeheader&quot;&gt;&lt;b&gt;Code&lt;/b&gt;:&lt;/div&gt;&lt;div class=&quot;code&quot;&gt;&lt;pre style=&quot;display: inline; margin-top: 0;&quot;&gt;&lt;i&gt;http://www.wincustomize.com/explore/logonstudio_xp/9606/&lt;/i&gt;&lt;/pre&gt;&lt;/div&gt;&lt;br /&gt;
&lt;u&gt;&lt;i&gt;&lt;b&gt;Or&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;codeheader&quot;&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;code&quot;&gt;&lt;pre style=&quot;display: inline; margin-top: 0;&quot;&gt;&lt;i&gt;http://skins19.wincustomize.com/24/79/2479496/26/9859/preview-26-9859.jpg&lt;/i&gt;&lt;/pre&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Optional&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
3) The switch user button was annoying me so i downloaded this to  remove it.&lt;br /&gt;
&lt;div class=&quot;codeheader&quot;&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;code&quot;&gt;&lt;pre style=&quot;display: inline; margin-top: 0;&quot;&gt;&lt;i&gt;http://www.megaupload.com/?d=8N0EGIW4&lt;/i&gt;&lt;/pre&gt;&lt;/div&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;Start it up, then open it and it&#39;ll do the rest&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;For the users that want their &#39;switch user&#39; button back download this:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;codeheader&quot;&gt;&lt;b&gt;Code:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;code&quot;&gt;&lt;pre style=&quot;display: inline; margin-top: 0;&quot;&gt;&lt;i&gt;http://www.megaupload.com/?d=AA5V5SFQ&lt;/i&gt;&lt;/pre&gt;&lt;/div&gt;&lt;div class=&quot;code&quot;&gt;&lt;pre style=&quot;display: inline; margin-top: 0pt;&quot;&gt;&lt;i&gt;&amp;nbsp;&lt;/i&gt;&lt;/pre&gt;&lt;/div&gt;Just run the file and it will return your button. That&#39;s it enjoy &lt;img alt=&quot;Grin&quot; border=&quot;0&quot; src=&quot;http://www.andhrahackers.com/forum/Smileys/fantasticsmileys/grin.gif&quot; /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/7716001051760154748'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/7716001051760154748'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/how-to-get-your-computer-to-have-fbi.html' title='How to get your computer to have an FBI login screen'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilaDnu_hUQiXz5KnrpV8_G0RLaCW4D__YbrR8U0fixHDT7dbYIxf3mzxht9PkTelYU4O5nYpoLB-57SnuOo1TP0sEZJo2lzemVu462-yHFXE9QDqcSNooQcaStdDwcawjetm6HsiPr6HQ/s72-c/FBI.jpg" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-1105896200033359042</id><published>2011-09-17T14:18:00.001+05:30</published><updated>2011-09-17T14:19:59.006+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="SEO Tips"/><title type='text'>What is Black Hat SEO (Search Engine Optimization)?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Before being a successful webmaster you should be master in Seo also.  Today let’s know about the introduction about Black-Hat SEO today.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyeg26xSLF3vL-dpG57kErY2xEjQgcwszXq32kex8ya_yjkfws7RpV4ccI4K6lcofNT2Kqx5xreeIRwozcwswCNaz4TiXr7OMB7bYf6q1vGaEUU4nE0gwhgqYcxhexBZznuIfHZ6wESmw/s1600/black-hat-seo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyeg26xSLF3vL-dpG57kErY2xEjQgcwszXq32kex8ya_yjkfws7RpV4ccI4K6lcofNT2Kqx5xreeIRwozcwswCNaz4TiXr7OMB7bYf6q1vGaEUU4nE0gwhgqYcxhexBZznuIfHZ6wESmw/s1600/black-hat-seo.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
SEO makes use of various techniques that will help you to naturally draw  traffic to your site. Professional SEO companies will help you with  better content witting which involves the use of relevant keywords as  per the content. They also help you to submit the links of your site to  various other sites so that you can get back links to your site. If you  make use of any SEO company which does its work using ethical techniques  then you are sure to get higher and higher in the search engines. The  main aim of Search engine Optimization is to get traffic to your website  and to convert your visitors into your potential buyers.&lt;br /&gt;
&lt;br /&gt;
Black Hat Search Engine Optimization (Black Hat SEO) as combination of  techniques such as sneaky redirects, cloaking and invisible text that  are used by SEO persons to get higher rankings in search engines in an  unethical manner Black Hat SEO techniques generally break the official  SEO rules and regulations. This results in poor user experience.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #660000;&quot;&gt;The various ways of doing Black Hat SEO are:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Keyword stuffing: &lt;/b&gt;The excess use of key words in the content is  known as Keyword stuffing. In Keyword stuffing same keyword is repeated  in the whole content in order to get higher ranks in the search engines.&lt;br /&gt;
Invisible Text: This technique is used by sites for which ethics are of  no use. In this technique the keywords are made of the same color as the  background so that search engine spiders can find them but are not  visible to the general visitors.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Doorway pages:&lt;/b&gt; This technique is against the ethical SEO rules.  Doorway pages are the pages that are can be seen by the search engine  spiders but are invisible to the generally visitors. They are used only  to get higher rankings in the search engines by tricking them. It is not  a good way because it hurts the visitors who visit to the site to see  some quality content but what they see is the keyword stuffed pages.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Cloaking: &lt;/b&gt;This method is used to cheat the search engines in  order to get good ranks ion the search engines. It is done to get good  rank for certain keywords. A user identified as search engine is shown a  specifically prepared and optimized website with only purpose to rank  well for desired keywords. If a user is not a search engine they are  presented with the “real” websites content which is often spammed and of  lesser quality.&lt;br /&gt;
Cloaking is also used to trick users to visit websites based on their  description in search engines. For example a user searching for a  particular product could click on a website in search engine due to its  description and title. The site in question will not be the one  described in SERP’s. It can be totally different or irrelevant.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;RSS Spamming: &lt;/b&gt;Now a day’s many people use their RSS feed in  comments instead of their blog’s URL. What it does is that if some  visitor only wants to visit your blog to see it but due to RSS spamming  he has to subscribe to your feed. By doing this their IP can be black  listed from any site in a click.&lt;br /&gt;
&lt;br /&gt;
Black hat SEO is not a good idea. Because Search Engine Spiders can  catch you and your site can be banned from various search engine  rankings. It may look like a good idea in the initial stages but for the  long run it is not good at all.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;Black Hat is an unfair mean of practicing SEO&lt;/b&gt; because it does  not follow the rules and regulations followed by the ethical SEO. Black  hat make search engine spiders and general visitors to visit the sites  which are having poor content. This gives not a very pleasant experience  to the visitors. So Black hat practice should not be used.&lt;/i&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/1105896200033359042'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/1105896200033359042'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/what-is-black-hat-seo-search-engine.html' title='What is Black Hat SEO (Search Engine Optimization)?'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyeg26xSLF3vL-dpG57kErY2xEjQgcwszXq32kex8ya_yjkfws7RpV4ccI4K6lcofNT2Kqx5xreeIRwozcwswCNaz4TiXr7OMB7bYf6q1vGaEUU4nE0gwhgqYcxhexBZznuIfHZ6wESmw/s72-c/black-hat-seo.jpg" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-4216539725271719161</id><published>2011-09-15T14:20:00.000+05:30</published><updated>2011-09-15T14:20:33.199+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 8"/><title type='text'>Windows 8 Screenshot Tour: Everything You Possibly Want to Know</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvqcEUn_VzlGKWNuc4BIA_2pZSVDGgMW0sr1iFiWk94LTxJo5Flcp9EDC7wrSwkzSqQyU7rX51fGGViqIi28iTzGbqstZLc07WyVrzyKslaSGyTJ0w6-jf2ylLtl6YghaRK6Hb8WR1D5c/s1600/head-8.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;220&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvqcEUn_VzlGKWNuc4BIA_2pZSVDGgMW0sr1iFiWk94LTxJo5Flcp9EDC7wrSwkzSqQyU7rX51fGGViqIi28iTzGbqstZLc07WyVrzyKslaSGyTJ0w6-jf2ylLtl6YghaRK6Hb8WR1D5c/s400/head-8.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Yesterday Microsoft released the first preview release of Windows 8,  and we spent all night testing it out and diving into how it all works.  Here’s our review, and the normal &lt;b&gt;Convex Coders&lt;/b&gt; style screenshot tour,  with loads and loads of pictures.&lt;br /&gt;
&lt;i&gt;&lt;em&gt;&lt;b&gt;Note:&lt;/b&gt; &lt;/em&gt;this article was so incredibly long that we broke it up into multiple pages, which isn’t something we do often.&lt;/i&gt;&lt;br /&gt;
&lt;h3&gt;So What’s New in Windows 8?&lt;/h3&gt;There’s a ton of new stuff in Windows 8, but the biggest change that  you’ll notice right away is the addition of the new tile-based Metro  interface, which you can see in the screenshot above. Keep in mind that  this is the developer preview release, which means it’s nowhere near  finished, and you should definitely not install this on your primary PC.&lt;br /&gt;
We’ll go into loads of detail about everything as you read further,  but first here’s a quick list of just some of the new features:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Metro Interface&lt;/strong&gt; – the new default interface in Windows 8, keep reading for everything about this.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Faster Boot Times&lt;/strong&gt; – Windows 8 will boot much faster  than Windows 7, thanks to a partial hibernation mode and a lot of  improvements in the loading process. On my old Dell laptop, it boots in  less than 10 seconds – on new machines, it’s crazy fast.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Less Memory Usage&lt;/strong&gt; than Windows 7. That’s right.  Microsoft is saying that not only will this version use less RAM than  Win7, it also uses less running processes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Windows Explorer overhauled&lt;/strong&gt;, now has the Ribbon UI, Revamped File Copying, and ISO mounting.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;In-Place PC Refresh&lt;/strong&gt; will reload Windows in just a couple of clicks, keeping your files intact.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ARM processors are now supported&lt;/strong&gt;, which will lead to an entirely new class of low-power, battery-efficient tablets.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hyper-V is now part of Windows&lt;/strong&gt; – so now you can create virtual machines easily without installing anything extra.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Taskbar can now span multiple monitors&lt;/strong&gt; – this very simple feature has finally made it into Windows.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Wallpaper can now span multiple monitors&lt;/strong&gt; – yet another feature that should have been around 10 years ago.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Universal Spell Check&lt;/strong&gt; across Metro applications.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Windows Live Integration&lt;/strong&gt; for Sync, Mail, Skydrive  lets you sync all your settings across your PCs, including your files,  mail, and photos. The sync is available in the preview, but the Skydrive  and Mail are not yet.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Windows Store&lt;/strong&gt; will let you purchase Windows apps all in a single place.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;New Task Manager&lt;/strong&gt; is completely revamped with much  better tools, including a way to disable startup applications, track  application resource usage over time, and even easily restart Windows  Explorer.&lt;/li&gt;
&lt;/ul&gt;There’s way more changes all over the place, and we’ll try and cover  as much as possible, but there’s no way we can get everything. Not to  mention the fact that this is a preview, so there’s probably a whole lot  more coming in the beta.&lt;br /&gt;
&lt;h3&gt;How Can I Get Windows 8?&lt;/h3&gt;First, you’ll want to make sure that your PC can run Windows 8, and  thankfully the Windows 8 system requirements are basically the same as  Windows 7. You can probably get away with installing this on a PC with  lousy specs, but obviously you’ll have a better experience on a faster  machine. Here’s the specs:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor&lt;/li&gt;
&lt;li&gt;1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)&lt;/li&gt;
&lt;li&gt;16 GB available hard disk space (32-bit) or 20 GB (64-bit)&lt;/li&gt;
&lt;li&gt;DirectX 9 graphics device with WDDM 1.0 or higher driver&lt;/li&gt;
&lt;li&gt;Taking advantage of touch input requires a screen that supports multi-touch&lt;/li&gt;
&lt;/ul&gt;The key thing to note is that you don’t need a touch device to install Windows 8. Keyboard and mouse will work just fine.&lt;br /&gt;
Just head to &lt;a href=&quot;http://dev.windows.com/&quot;&gt;dev.windows.com&lt;/a&gt; and download the ISO images from the page. Then head to the Microsoft Store page and &lt;a href=&quot;http://www.microsoftstore.com/store/msstore/html/pbPage.Help_Win7_usbdvd_dwnTool&quot;&gt;download the USB/DVD Download Tool&lt;/a&gt;,  which can put the ISO image onto a bootable flash drive for  installation—all you have to do is choose the ISO, choose the drive, and  wait for it to finish copying.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglsvRDZbrDKfOXrJFIjkCj3EHGf9ohpzDgq1hnr_JJuOBF4kL7ENiBBvRRaKfUuPR7Qi2aBZQdSE0NcMqTkJBNr_5RfcziSKEjtBoaRVTHpY_56IE1qCN8swTJI4PI650iAuX2ts7t6p0/s1600/image49.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;206&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglsvRDZbrDKfOXrJFIjkCj3EHGf9ohpzDgq1hnr_JJuOBF4kL7ENiBBvRRaKfUuPR7Qi2aBZQdSE0NcMqTkJBNr_5RfcziSKEjtBoaRVTHpY_56IE1qCN8swTJI4PI650iAuX2ts7t6p0/s400/image49.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
The setup process is nearly identical to Windows 7, so we’re not  going to go into detail about it here. We’ll assume if you’re installing  Windows 8 that you’re not a newb, and as such you shouldn’t need any  help clicking through a couple of installer screens. &lt;br /&gt;
&lt;h3&gt;Various Install Notes:&lt;/h3&gt;&lt;ul&gt;&lt;li&gt;We were not able to get it working in VMware Workstation or Virtual PC.&lt;/li&gt;
&lt;li&gt;If you do want to virtualize, try VirtualBox. Many readers reported luck with this.&lt;/li&gt;
&lt;li&gt;You don’t need a product key or a login to download or install Windows 8.&lt;/li&gt;
&lt;li&gt;The preview release is supposed to auto-update. There’s no word on  when the Beta release will be out, or whether it will automatically  upgrade.&lt;/li&gt;
&lt;li&gt;The preview release does not have Media Center included. Microsoft says that it will be a part of Windows 8 though.&lt;/li&gt;
&lt;li&gt;If you want to disable Metro UI entirely, you can open up the  registry editor and change the value of RPEnabled to 0 instead of 1 at  the following key: (via &lt;a href=&quot;http://www.neowin.net/news/windows-8-how-to-re-enable-the-classic-start-menu&quot;&gt;NeoWin&lt;/a&gt;)&lt;br /&gt;
&lt;blockquote&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\&lt;/blockquote&gt;Note that we’re not recommending this, because it makes installing Windows 8 fairly pointless.  &lt;/li&gt;
&lt;li&gt;If you’re using Internet Explorer from the Metro pane,  you’ll notice that Flash doesn’t work. This is actually by design – no  plugins in the Metro IE.&lt;/li&gt;
&lt;/ul&gt;Good luck, and make sure to let us know in the comments how you fare.&lt;br /&gt;
&lt;h3&gt;What’s This Metro Interface All About?&lt;/h3&gt;Metro is a tile-based interface focused on being clean and simple,  with simple icons and beautiful typography instead of the typical  shadows and raised button interfaces that we’re used to. Many tiles are  more than just an application launcher, they contain live data that  updates automatically—a weather tile will automatically show the latest  weather report, a news title will scroll the latest from your feeds, the  social widget will show the latest photos from Facebook, and your stock  ticker will automatically show you what those greedy Wall Street people  are up to.&lt;br /&gt;
This interface was first released on Windows Phone, and while it’s  definitely ideal for a touchscreen environment, it’s also quite usable  with the keyboard and mouse—though you will find that scrolling multiple  pages is much more tedious using just the mouse than using a simple  swipe on the screen.&lt;br /&gt;
&lt;strong&gt;Metro Features&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Universal Sharing&lt;/strong&gt; across applications allows  applications to easily share files or text with cloud services (and each  other). You can load a picture from Facebook into a photo editing app,  then share it on Twitter once you’re done. And it’s all hooked into the  common file open dialogs, and the new Share feature.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Universal Search&lt;/strong&gt; allows applications to register  with the global search in the Metro interface, so you can search across  any application that supports it.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hardware Acceleration &lt;/strong&gt;– all Metro applications are automatically hardware accelerated, making the entire experience much more smooth.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Process Suspending&lt;/strong&gt; – Windows can automatically suspend Metro applications for better battery life when they aren’t being used.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;New WindowsRT runtime&lt;/strong&gt; provides these features to  any application in almost any language, with almost no extra code. That  means existing applications can be easily modified to connect to social  networks without writing any networking code.&lt;/li&gt;
&lt;/ul&gt;&lt;em&gt;To bring up the Metro Start screen when you’re in any other application, just hit the Windows button.&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeIBOw1IKn-XU8FjUIE5edILYqxZcdm5cF28K5Shd0X_E4LySWzTlo7Vjlo93sIPpJJQvJ9bCA9Hf4ddvlrYz3tTSeByIiil6m2sTp_pjtqpq0xv4LcFExFMpnZod3w4yBziF5nFHxMGk/s1600/image50.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjeIBOw1IKn-XU8FjUIE5edILYqxZcdm5cF28K5Shd0X_E4LySWzTlo7Vjlo93sIPpJJQvJ9bCA9Hf4ddvlrYz3tTSeByIiil6m2sTp_pjtqpq0xv4LcFExFMpnZod3w4yBziF5nFHxMGk/s400/image50.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
The main Start screen is also a complete replacement for the Windows 7  Taskbar—you can just start typing at any point while viewing the main  Metro Start screen and you’ll be able to quickly find any application on  your system the same way that you could on Windows 7.&lt;br /&gt;
&lt;strong&gt;Metro Keyboard Shortcuts&lt;/strong&gt;&lt;br /&gt;
These are a few keyboard shortcuts that I’ve personally been using.  There’s others, but I haven’t figured out whether they work for  mouse/keyboard mode or only if you’re using a touch screen with a  keyboard also connected, so I won’t include them.&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Windows+F – Opens File Search&lt;/li&gt;
&lt;li&gt;Windows+C – Opens Charms Bar&lt;/li&gt;
&lt;li&gt;Windows+I – Opens Settings&lt;/li&gt;
&lt;li&gt;Windows+Q – Opens App Search pane&lt;/li&gt;
&lt;li&gt;Windows+W – Opens Settings Search app&lt;/li&gt;
&lt;li&gt;Windows+Z – Opens App Bar&lt;/li&gt;
&lt;/ul&gt;If you aren’t at the Start screen, all you have to do is hit the  Windows key to get back to the screen, and then start typing to launch  an application—it’s the same set of keystrokes you would use before, but  a different interface.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjskmozcsSb-93ylgPxHBIR5C6FXAaw_FT9rlq_4n05x4gKsKkEC4gejiSFEkBFT2MOSSgBCJgtRfxzPmsTCniKGji9WgmvrixFQ0TSn_gZq1HlOZC5fQr2xoYYWQLePBzTKR2IyI1Y4Lc/s1600/sshot-2011-09-14-331.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjskmozcsSb-93ylgPxHBIR5C6FXAaw_FT9rlq_4n05x4gKsKkEC4gejiSFEkBFT2MOSSgBCJgtRfxzPmsTCniKGji9WgmvrixFQ0TSn_gZq1HlOZC5fQr2xoYYWQLePBzTKR2IyI1Y4Lc/s400/sshot-2011-09-14-331.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&amp;nbsp;Back on the main Metro screen, you can easily click and drag to move  items around on the screen. If you’re using a touch interface, you can  do the same thing with your fingers. You can even zoom out using a Pinch  gesture to see all of the items on the screen without having to  scroll—as far as we can tell, there’s no way to do that in the  mouse-only interface, but if you know how to do that, please leave a  comment and tell us how.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0JBZPLkJezgh0hcZSsfcZb7sEKtgDIA3lBTSf31119QFTija7tHZeRKVTohHo-2tGFASSAn7xNHq_-qg0q6YV51D7EqhEsZM0ccHnSMgdJFaIQ3Gd9VGY_plvBjBVt7kVHZqCJ4ju34U/s1600/image57.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;202&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0JBZPLkJezgh0hcZSsfcZb7sEKtgDIA3lBTSf31119QFTija7tHZeRKVTohHo-2tGFASSAn7xNHq_-qg0q6YV51D7EqhEsZM0ccHnSMgdJFaIQ3Gd9VGY_plvBjBVt7kVHZqCJ4ju34U/s400/image57.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;If you right-click on a tile you’ll see a check box—if you’re using the touch interface you can nudge the tile up or down…&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMAEpw15s27RAJ5sr0gN5jtJ_iGqXURfKvNkIRZetWnKiU6Tuz4PgvNtJHx6IMKfFVaZL8xNokub_SYHMh3Lht4vR7b7H4MomJQ5qKYGcVqkjDTrCsww6PRvKnPQ66lz6QaFU8kYCYUlE/s1600/image58.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;195&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMAEpw15s27RAJ5sr0gN5jtJ_iGqXURfKvNkIRZetWnKiU6Tuz4PgvNtJHx6IMKfFVaZL8xNokub_SYHMh3Lht4vR7b7H4MomJQ5qKYGcVqkjDTrCsww6PRvKnPQ66lz6QaFU8kYCYUlE/s400/image58.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Which will enable a menu at the bottom of the screen. Depending on what  tile you’ve selected, you’ll either get items to make it Larger,  Smaller, Uninstall it, Pin it, or Unpin it.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAOmFlq8X2ogAMdtqOedQwd4K8A2XQJ9SRstxQS6Od_BJCbZ1zZJESFVMnDfLYvwQGojRlPcnY12PZ5NtapJ3aa8MZDD3tenXI_e-kEuE7uLcEJif2seKIfTCnY6NGdDBj5k1sRHA-uH4/s1600/image59.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;123&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAOmFlq8X2ogAMdtqOedQwd4K8A2XQJ9SRstxQS6Od_BJCbZ1zZJESFVMnDfLYvwQGojRlPcnY12PZ5NtapJ3aa8MZDD3tenXI_e-kEuE7uLcEJif2seKIfTCnY6NGdDBj5k1sRHA-uH4/s640/image59.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;If you were to click on a regular application like Task Manager or the  command prompt, you’ also get some extra items like Run as  Administrator, which is pretty useful for many system tasks.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEzRdk9AWynegwA4dZi4D7Tgi34Xp44IW6SVfhUcFCNeTRSYLVVSkZ1A3i0f3KSIIxoRfOdqHQEgnYXCn14GFkzwFZUHFJwO_g5Q2Llm2TLoMMLPJ2-b4BWy9T5jOdJoyEZbSFhsBO6Cc/s1600/image60.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEzRdk9AWynegwA4dZi4D7Tgi34Xp44IW6SVfhUcFCNeTRSYLVVSkZ1A3i0f3KSIIxoRfOdqHQEgnYXCn14GFkzwFZUHFJwO_g5Q2Llm2TLoMMLPJ2-b4BWy9T5jOdJoyEZbSFhsBO6Cc/s640/image60.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Some of the tiles will open up a Metro-style application, which is  always full screen. The Weather application can be customized for your  location, and you can even pin multiple weather tiles to the home screen  for multiple locations.&lt;br /&gt;
You might notice the purple bar on the left hand side of the  screen—that’s very important. Whenever you’re in a Metro application  using a touch interface, you can swipe from the left side to flip  between applications. Keep swiping left to cycle through all of the  applications. This is roughly the same as using Win+Tab, which works  differently in Windows 8 than it did in Windows 7. You can, of course,  still use Alt+Tab the way you always did.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiWUzeIz1R51PkWloKWnUS8OjjgYUAW4Mw6NByMQHbiqvBEy5JaRBtMqZLRIau4ru40XFzejIZM2FNZqYdhqSO_r5w4loiETmc81Un-1lTmrEDRdiCauoNDSNClp85poFaw6fS-jUTKyY/s1600/image61.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;356&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiWUzeIz1R51PkWloKWnUS8OjjgYUAW4Mw6NByMQHbiqvBEy5JaRBtMqZLRIau4ru40XFzejIZM2FNZqYdhqSO_r5w4loiETmc81Un-1lTmrEDRdiCauoNDSNClp85poFaw6fS-jUTKyY/s640/image61.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;If you swipe from the left and then drop the thumbnail into the screen,  you can actually dock two separate full-screen applications into the  same screen—notice the green line in the middle of the two applications  below. On the left is the news feed, and the right is a photo  application. You can switch which side of the screen has the “sidebar”  application, or switch which application is on either side. What you  can’t do, however, is adjust them to be 50/50, it’s a fixed ratio.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBT0V_Shmf48jXfSBzGBlk1YasLNDAdDIoX4szO2Vth4ABzFKGTLik2HJQZjvjWrOgwpbpU8c69whOod9x-lQIRNqKI-l5Y4OIZI254j_1b-90g-CWJNPgRrw37e76AIAvBhXorYJJCQY/s1600/image64.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;376&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBT0V_Shmf48jXfSBzGBlk1YasLNDAdDIoX4szO2Vth4ABzFKGTLik2HJQZjvjWrOgwpbpU8c69whOod9x-lQIRNqKI-l5Y4OIZI254j_1b-90g-CWJNPgRrw37e76AIAvBhXorYJJCQY/s640/image64.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;Swiping from the right side will pull up another menu, which they call  the “Charms” menu. Yes, that’s a very silly name. This allows you to get  to various functions like Search, Share, or Settings, and this works  across the board in Metro applications. You’ll most likely use this  feature most often to search and share from within applications—for  instance, if you were viewing a photo and wanted to share it on  Facebook, or if you needed to do a search through an application for a  file.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7t77-6WY_qcFvJwNyVMnl3tv8eZTYP2ex-ga0pJAiX4j_r-GEsFQMtHO96oxb_8es5BvMQ_Sz4j7xCW5Hu_zzS0rwr5UF_j65Hi8pKgeapLMFddcLW3DcYau9yMt9Rb0YSLoc53CZZk8/s1600/image62.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;298&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj7t77-6WY_qcFvJwNyVMnl3tv8eZTYP2ex-ga0pJAiX4j_r-GEsFQMtHO96oxb_8es5BvMQ_Sz4j7xCW5Hu_zzS0rwr5UF_j65Hi8pKgeapLMFddcLW3DcYau9yMt9Rb0YSLoc53CZZk8/s400/image62.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;If you’re using the keyboard and mouse, you can use the Win+C menu to  pull up the same menu, except in the lower left-hand corner. Oddly, you  can also move your mouse to the lower left corner of the screen, and the  menu will show up—in fact, this works whether you are in the Metro  interface or back on the Windows 7 style Taskbar.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwUoub3obH3BvF4qvvgQJVyOCZOCjwguPE4qObar7m95NNJykF_qgwTGDP553PhSUFaX_qUpuO_jMjcTmpiy_BTcO0rOrSAZ0v4X_P_ccocpZl_-2ykDpl_hW9QXT0QzsHAri72uUkyy4/s1600/sshot-2011-09-14-321.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;225&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwUoub3obH3BvF4qvvgQJVyOCZOCjwguPE4qObar7m95NNJykF_qgwTGDP553PhSUFaX_qUpuO_jMjcTmpiy_BTcO0rOrSAZ0v4X_P_ccocpZl_-2ykDpl_hW9QXT0QzsHAri72uUkyy4/s400/sshot-2011-09-14-321.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&amp;nbsp;Here’s a closer view of the menu:&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmel9V9_BzwbhzKQqCee88cgp7pSZa1dYPus4DDLUIdULk_oYnLazVm3fR0IjTA1hN8SHqpoZzJj3ODThWtwolWt0uqYRtmlruaREpaMVzHT06LOYHGsdk9qOUDg7epzg_3xjkHgB7090/s1600/image63.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;259&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmel9V9_BzwbhzKQqCee88cgp7pSZa1dYPus4DDLUIdULk_oYnLazVm3fR0IjTA1hN8SHqpoZzJj3ODThWtwolWt0uqYRtmlruaREpaMVzHT06LOYHGsdk9qOUDg7epzg_3xjkHgB7090/s640/image63.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;Keep reading for the rest of the review, including the new Windows 8  Explorer, Task Manager, the new Control Panel, and a bunch more.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRPMG31DyR3Nla7EVwzZoW8hp6pJhs2JJWEw5t7yld1E1bdBbC6HGhomljICDlnJMcyXttjATJ6Hkvy7WrekNxHLRTx4XvGQnHnsYVQFJ6sl0V9xIB227Z5-XCYgwLm6B90Nv2Zzfncqg/s1600/image49.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRPMG31DyR3Nla7EVwzZoW8hp6pJhs2JJWEw5t7yld1E1bdBbC6HGhomljICDlnJMcyXttjATJ6Hkvy7WrekNxHLRTx4XvGQnHnsYVQFJ6sl0V9xIB227Z5-XCYgwLm6B90Nv2Zzfncqg/s1600/image49.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/4216539725271719161'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/4216539725271719161'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/windows-8-screenshot-tour-everything.html' title='Windows 8 Screenshot Tour: Everything You Possibly Want to Know'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvqcEUn_VzlGKWNuc4BIA_2pZSVDGgMW0sr1iFiWk94LTxJo5Flcp9EDC7wrSwkzSqQyU7rX51fGGViqIi28iTzGbqstZLc07WyVrzyKslaSGyTJ0w6-jf2ylLtl6YghaRK6Hb8WR1D5c/s72-c/head-8.png" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-3608266441766428097</id><published>2011-09-15T13:27:00.002+05:30</published><updated>2011-09-15T13:27:49.993+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="E-Books"/><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><title type='text'>Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnE7MQ47itA5CXw20rnFQ5DjsMSCy66OMkqO1NoZxyHyQ83tWZEZNoRGtLcl93XFSQuGSeIF8X7fnPziXNBG_Bxcp03OZtHipN_oAmZBEt93abmG8kV36rxEtkNKAIwsEUSPsRexyevWs/s1600/5580OS_Backtrack+5+Wireless+Penetration.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnE7MQ47itA5CXw20rnFQ5DjsMSCy66OMkqO1NoZxyHyQ83tWZEZNoRGtLcl93XFSQuGSeIF8X7fnPziXNBG_Bxcp03OZtHipN_oAmZBEt93abmG8kV36rxEtkNKAIwsEUSPsRexyevWs/s640/5580OS_Backtrack+5+Wireless+Penetration.jpg&quot; width=&quot;518&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
This book will provide a highly technical and in-depth treatment of  Wi-Fi security. The emphasis will be to provide the readers with a deep  understanding of the principles behind various attacks and not just a  quick how-to guide on publicly available tools. We will start our  journey with the very basics by dissecting WLAN packet headers with  Wireshark, then graduate to the next level by cracking WEP, WPA/WPA2 and  then move on to real life challenges like orchestrating  Man-in-the-Middle attacks, creating Wi-Fi Honeypots and compromise  networks running WPA-Enterprise mechanisms such as PEAP and EAP-TTLS.&lt;br /&gt;
&lt;br /&gt;
Even though touted as a Beginner&#39;s Guide, this book has something for  everyone - from the kiddies to the Ninjas.  You can purchase the book  from:&lt;br /&gt;
&lt;b&gt;Global: &lt;/b&gt;&lt;span class=&quot;aptureLink &quot; id=&quot;apture_prvw1&quot;&gt;&lt;span class=&quot;aptureLinkIcon&quot; style=&quot;background-position: right -1348px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a class=&quot;aptureLink snap_noshots&quot; href=&quot;http://www.amazon.com/gp/product/1849515581?tag=apture-20&quot;&gt;http://www.amazon.com/BackTrack-Wireless-Penetration-Testing-Beginners/dp/1849515581/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;India: &lt;/b&gt;&lt;a href=&quot;http://www.packtpub.com/backtrack-5-wireless-penetration-testing-beginners-guide/book&quot;&gt;http://www.packtpub.com/backtrack-5-wireless-penetration-testing-beginners-guide/book&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Sample Chapter can be downloaded here:&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.packtpub.com/sites/default/files/5580OS-Chapter-6-Attacking-the-Client_0.pdf&quot;&gt;http://www.packtpub.com/sites/default/files/5580OS-Chapter-6-Attacking-the-Client_0.pdf&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Author Bio:&lt;/b&gt;&lt;br /&gt;
Vivek Ramachandran, the author of the book has been into Wireless  security research since 2003. He has spoken at conferences such as  Blackhat, Defcon and Toorcon on Wireless Security and is the discoverer  of the Caffe Latte attack. He also broke WEP Cloaking, a WEP protection  schema in 2007 publically at Defcon. He was one of the programmers of  the 802.1x protocol and Port Security in Cisco&#39;s 6500 Catalyst series of  switches. He was one of the winners of Microsoft Security Shootout  contest held in India among a reported 65,000 participants. He is best  known in the hacker community as the founder of SecurityTube.net where  he routinely posts videos on Wi-Fi Security, Assembly Language,  Exploitation Techniques etc. Vivek&#39;s work on wireless security has been  quoted in BBC online, InfoWorld, MacWorld, The Register, IT World Canada  etc. places. This year he is either speaking or training at Blackhat,  Defcon, Hacktivity, HITB-ML, Brucon, Derbycon, HashDays, SecurityByte  etc.&lt;br /&gt;
For those who cannot afford to purchase the book, Vivek&#39;s Wireless  Megaprimer Video series (12+ hours of HD videos on Wi-Fi Hacking) is the  next best thing to it.&lt;br /&gt;
&lt;b&gt;You can download the DVD here:&lt;/b&gt; &lt;a href=&quot;http://www.securitytube.net/downloads&quot;&gt;http://www.securitytube.net/downloads&lt;/a&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/3608266441766428097'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/3608266441766428097'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/backtrack-5-wireless-penetration.html' title='Backtrack 5 Wireless Penetration Testing by Vivek Ramachandran'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnE7MQ47itA5CXw20rnFQ5DjsMSCy66OMkqO1NoZxyHyQ83tWZEZNoRGtLcl93XFSQuGSeIF8X7fnPziXNBG_Bxcp03OZtHipN_oAmZBEt93abmG8kV36rxEtkNKAIwsEUSPsRexyevWs/s72-c/5580OS_Backtrack+5+Wireless+Penetration.jpg" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-3613910563735053878</id><published>2011-09-15T13:26:00.002+05:30</published><updated>2011-09-15T13:26:30.166+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><title type='text'>uTorrent &amp; BitTorrent Sites Hacked, Spread Security Shield Malware</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt; &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyuo7iNtOpSx3qFzYW1qNw-xfosxVzdmRiAQHg-t7lao7NgUKewnNFUqwCJKITgmaJoundVXh0pClax9yBfQ10RBSqjYREdWTAhs2gbzLkmir2EbavZT2NhOocLQfrDQlhZeBxDz5wxQE/s1600/bBoVvbFeWRneFBWENoSxfDl72eJkfbmt4t8yenImKBU8NzMXDbey6A_oozMjJETc.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyuo7iNtOpSx3qFzYW1qNw-xfosxVzdmRiAQHg-t7lao7NgUKewnNFUqwCJKITgmaJoundVXh0pClax9yBfQ10RBSqjYREdWTAhs2gbzLkmir2EbavZT2NhOocLQfrDQlhZeBxDz5wxQE/s400/bBoVvbFeWRneFBWENoSxfDl72eJkfbmt4t8yenImKBU8NzMXDbey6A_oozMjJETc.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;Attackers hijacked two popular Torrent websites  &quot;bittorrent.com and utorrent.com&quot; and tampered with their download  mechanisms, causing visitors trying to obtain file-sharing software to  instead receive malware. The site reported on its &lt;a href=&quot;http://www.blogger.com/The%20site%20reported%20on%20its%20blog%20that%20the%20attack%20had%20occurred%20at%20around%2004:20%20Pacific%20Daylight%20Time%20%2811:20%20GMT%29%20on%20Tuesday.%20Initially,%20the%20incursion%20was%20also%20thought%20to%20have%20affected%20the%20servers%20of%20the%20main%20BitTorrent%20site,%20but%20further%20investigation%20revealed%20this%20site%20had%20been%20unaffected%20by%20the%20attack.%20%20Read%20more:%20http://www.thinq.co.uk/2011/9/14/utorrent-file-sharing-site-hacked-malware-left/#ixzz1XxhOZoOw&quot;&gt;blog&lt;/a&gt;&amp;nbsp;that  the attack had occurred at around 04:20 Pacific Daylight Time (11:20  GMT) on Tuesday. Initially, the incursion was also thought to have  affected the servers of the main BitTorrent site, but further  investigation revealed this site had been unaffected by the attack.&lt;br /&gt;
&lt;br /&gt;
Once installed, Security Shield delivers false reports that a computer  is infected with multiple pieces of malware and prompts the user for  payment before claiming to disinfect the machine. The attack affected  only users who downloaded and installed software from bittorrent.com and  utorrent.com during the hour-and-fifty-minute window that the sites  were compromised. Those who installed software previously are  unaffected.&lt;br /&gt;
&lt;br /&gt;
&quot;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #990000;&quot;&gt;We  have completed preliminary testing of the malware. Upon installation, a  program called ‘Security Shield&quot; launches and pops up warnings that a  virus has been detected. It then prompts a user for payment to remove  the virus&lt;/span&gt;&lt;/i&gt;. &quot; experts write on the blog.&lt;br /&gt;
&lt;br /&gt;
It is very important to once more note that infected are only users who  have downloaded the software between 4:20 a.m. and 6:10 a.m. Pacific  time. If you have previously downloaded it - you can rest assured your  software is clean.&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/3613910563735053878'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/3613910563735053878'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/utorrent-bittorrent-sites-hacked-spread.html' title='uTorrent &amp; BitTorrent Sites Hacked, Spread Security Shield Malware'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyuo7iNtOpSx3qFzYW1qNw-xfosxVzdmRiAQHg-t7lao7NgUKewnNFUqwCJKITgmaJoundVXh0pClax9yBfQ10RBSqjYREdWTAhs2gbzLkmir2EbavZT2NhOocLQfrDQlhZeBxDz5wxQE/s72-c/bBoVvbFeWRneFBWENoSxfDl72eJkfbmt4t8yenImKBU8NzMXDbey6A_oozMjJETc.jpg" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-7602382188607695357</id><published>2011-09-15T13:23:00.000+05:30</published><updated>2011-09-15T13:23:32.181+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="The CYBER NEWS"/><category scheme="http://www.blogger.com/atom/ns#" term="Tools"/><title type='text'>THC-HYDRA v7.0 new version released for Download</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLJDva34cqys_e1BLLhyphenhyphenZmArYcOjGU-1AzOocwCimDJXZW7UvJpJ4lukBa4i22KfSjhnxvH7qwrRz7VXSpaTOERiF6cnJc0m_KiA1D_BROwf6MS_F_GrPE1vSeRz-qzTLNViid3ASasXA/s1600/6cce61d0e149ded800658df34cc65859.png&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLJDva34cqys_e1BLLhyphenhyphenZmArYcOjGU-1AzOocwCimDJXZW7UvJpJ4lukBa4i22KfSjhnxvH7qwrRz7VXSpaTOERiF6cnJc0m_KiA1D_BROwf6MS_F_GrPE1vSeRz-qzTLNViid3ASasXA/s400/6cce61d0e149ded800658df34cc65859.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt; &lt;b&gt;THC-HYDRA&lt;/b&gt; is a very fast network logon cracker which support many  different services. This tool is a proof of concept code, to give  researchers and security consultants the possibility to show how easy it  would be to gain unauthorized access from remote to a system. It was  tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and  OSX.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Official change log:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;New main engine for hydra: better performance, flexibility and stability&lt;/li&gt;
&lt;li&gt;New option -u – loop around users, not passwords&lt;/li&gt;
&lt;li&gt;Option -e now also works with -x and -C&lt;/li&gt;
&lt;li&gt;Added RDP module, domain can be passed as argument&lt;/li&gt;
&lt;li&gt;Added other_domain option to smb module to test trusted domains&lt;/li&gt;
&lt;li&gt;Small enhancement for http and http-proxy module for standard ignoring servers&lt;/li&gt;
&lt;li&gt;Lots of bugfixes, especially with many tasks, multiple targets and restore file&lt;/li&gt;
&lt;li&gt;Fixes for a few http-form issues&lt;/li&gt;
&lt;li&gt;Fix smb module NTLM hash use&lt;/li&gt;
&lt;li&gt;Fixed Firebird module deprecated API call&lt;/li&gt;
&lt;li&gt;Fixed for dpl4hydra to work on old sed implementations (OS/X …)&lt;/li&gt;
&lt;li&gt;Fixed makefile to install dpl4hydra (thx @sitecrea)&lt;/li&gt;
&lt;li&gt;Fixed local buffer overflow in debug output function (required -d to be used)&lt;/li&gt;
&lt;li&gt;Fixed xhydra running warnings and correct quit action event&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;a href=&quot;http://freeworld.thc.org/releases/hydra-7.0-src.tar.gz&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;Download THC-HYDRA v7.0&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/7602382188607695357'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/7602382188607695357'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/thc-hydra-v70-new-version-released-for.html' title='THC-HYDRA v7.0 new version released for Download'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLJDva34cqys_e1BLLhyphenhyphenZmArYcOjGU-1AzOocwCimDJXZW7UvJpJ4lukBa4i22KfSjhnxvH7qwrRz7VXSpaTOERiF6cnJc0m_KiA1D_BROwf6MS_F_GrPE1vSeRz-qzTLNViid3ASasXA/s72-c/6cce61d0e149ded800658df34cc65859.png" height="72" width="72"/><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-4239976796663254825</id><published>2011-09-13T18:08:00.000+05:30</published><updated>2011-09-13T18:08:26.690+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="OS Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><title type='text'>Best way to Crack the BIOS password</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;fw_sanitized&quot;&gt;&lt;div align=&quot;center&quot;&gt;&lt;i style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img src=&quot;http://gen-xtechcentre.webs.com/Bios.jpg&quot; /&gt;&lt;/i&gt;&lt;u&gt;&lt;b&gt;&lt;/b&gt;&lt;/u&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;
&lt;/div&gt;There  are a lot ways to Crack theBIOSpassword. This is one of them but I  would say that this one ismoreeffective than the rest because the rest  of the ways does notGuaranteeyou that it will Crack the BIOS password  while in this casetheCracking is Guaranteed since in this we will remove  thefunctionalityof password protection of the BIOS.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Follow the steps below:&lt;/b&gt;&lt;br /&gt;
[eminimall]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Boot up windows.&lt;br /&gt;
&lt;br /&gt;
2) go to dos-prompt or go to command prompt directly from the windows start up menu.&lt;br /&gt;
&lt;br /&gt;
3) type the command at the prompt: “debug” (without quotes ninja.gif )&lt;br /&gt;
&lt;br /&gt;
4) type the following lines &lt;br /&gt;
now exactly as given…….&lt;br /&gt;
o 70 10&lt;br /&gt;
o 71 20&lt;br /&gt;
quit&lt;br /&gt;
exit&lt;br /&gt;
&lt;br /&gt;
5) exit from the dos prompt and restart the machine&lt;br /&gt;
password protection gone!!!!!!!!!!!!!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Enjoy&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;b&gt;PS: I tested this in Award Bios……..&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
There seems  to be some issue regarding display drivers on some machines if this is  used. Just reinstall the drivers, Everything will be fine………..&lt;br /&gt;
&lt;br /&gt;
I have not found any other trouble if the codes are used.&lt;br /&gt;
&lt;br /&gt;
To be on safe side, just back up your data.&lt;br /&gt;
&lt;br /&gt;
The use of this code is entirely at ur risk.&lt;br /&gt;
&lt;br /&gt;
It worked fine for me.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;span class=&quot;fw_sanitized&quot;&gt;&lt;b&gt;SOURCE: &lt;a href=&quot;http://hackingelites.webs.com/&quot;&gt;&lt;i&gt;My 1st Website&lt;/i&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/4239976796663254825'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/4239976796663254825'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/best-way-to-crack-bios-password.html' title='Best way to Crack the BIOS password'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-1910076927836414946</id><published>2011-09-13T18:04:00.000+05:30</published><updated>2011-09-13T18:04:06.177+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Basic Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><title type='text'>Hack BSNL Broadband for Speed</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;fw_sanitized&quot;&gt;If you are a BSNL broadband user, chances  are that you are facingfrequent DNS issues. Their DNS servers are just  unresponsive. The lookup takes a long duration and many times just time  out. The solution?There is small hack on BSNL for this. Use third party  DNS serversinstead of BSNL DNS servers&amp;nbsp;or run your own one like &lt;a href=&quot;http://cr.yp.to/djbdns.html&quot; target=&quot;_blank&quot;&gt;djbdns&lt;/a&gt;. The easiest options is to use &lt;a href=&quot;http://www.opendns.com/&quot; target=&quot;_blank&quot;&gt;OpenDNS. &lt;/a&gt;Just reconfigure your network to use the following DNS servers:&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;b&gt;208.67.222.222&lt;/b&gt;&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;b&gt;208.67.220.220&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;span style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&amp;nbsp;&lt;img src=&quot;http://hackingelites.webs.com/broadband-150x150.jpg&quot; /&gt;&lt;/span&gt;&lt;/div&gt;Detailed instructions specific to operating system or your BSNL&amp;nbsp;modem are available in the &lt;br /&gt;
&lt;div align=&quot;left&quot;&gt;OpenDNS  website itself. After I reconfigured my BSNL modem to use theabove 2 IP  addresses, my DNS problems just vanished! Other ‘freebies’that come  with OpenDNS are phishing filters and automatic URLcorrection. Even if  your service provider’s DNS servers are workingfine, you can still use  OpenDNS just for these two specialfeatures.After you hack BSNL DNS  servers, you will see a noticeable improvement in your broadband speed.&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div align=&quot;left&quot;&gt;&lt;span class=&quot;fw_sanitized&quot;&gt;&lt;b&gt;SOURCE: &lt;a href=&quot;http://hackingelites.webs.com/&quot;&gt;&lt;i&gt;My 1st Website&lt;/i&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt; &lt;/div&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/1910076927836414946'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/1910076927836414946'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/hack-bsnl-broadband-for-speed.html' title='Hack BSNL Broadband for Speed'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-8522394185779493397</id><published>2011-09-13T18:01:00.002+05:30</published><updated>2011-09-13T18:01:37.440+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><title type='text'>How to Spoof Caller ID ? Caller ID Spoofing</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img height=&quot;193&quot; src=&quot;http://hackingelites.webs.com/Caller_ID_Spoofing.jpg&quot; width=&quot;181&quot; /&gt;&lt;/div&gt;&lt;span class=&quot;fw_sanitized&quot;&gt;Caller  ID spoofing is the act of making the telephone network todisplay any  desired (Fake) number on the recipient’s Caller IDdisplay&amp;nbsp;unit instead  of the original number. The Caller ID spoofing canmake a call appear to  have come from any phone number that&amp;nbsp;the callerwishes.Have you ever  wondered how to perform Caller ID spoofing? Read on&amp;nbsp;toknow&amp;nbsp;more  information on Caller ID spoofing and&amp;nbsp;find out&amp;nbsp;how it isperformed.&lt;br /&gt;
Unlike  what most people think,&amp;nbsp;an incoming call may not be from thenumber that  is displayed on the Caller ID display unit. Because of thehigh trust  that the people have in the Caller ID system, it is possiblefor the  caller to easily fool them&amp;nbsp;and make them believe thatthe&amp;nbsp;number  displayed on the Caller ID display is real.&amp;nbsp;This is allpossible through  Caller ID spoofing.&lt;br /&gt;
&lt;u&gt;&lt;b&gt;How to Spoof Caller ID?&amp;nbsp;&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
You  can easily spoof any&amp;nbsp;Caller ID using&amp;nbsp;services like SpoofCard.&amp;nbsp;Inorder  to use the spoofcard service,&amp;nbsp;you need to pay in advance andobtain a PIN  (Personal Identification Number) which grants accessto&amp;nbsp;make a call  using the Caller ID spoofing service. Once you havepurchased the  service, you will be given access to login to&amp;nbsp;yourSpoofCard account. To  begin with, you need to call the number given bySpoofCard and enter the  PIN. Now you will be given access to enter thenumber you wish to call  and the number you wish to appear as the CallerID. Once you select the  options and initiate the calling process, thecall is bridged and the  person on the other end receives your call. Thereceiver would normally  assume that the call was coming from adifferent phone number&amp;nbsp;ie: the  spoofed number chosen by&amp;nbsp;you&amp;nbsp;- thustricking the receiver into thinking  that the call was coming from adifferent individual or organization than  the caller’s. In this way itis just a cakewalk to spoof Caller ID&amp;nbsp;and  trick the&amp;nbsp;receiver on theother end.&amp;nbsp;Thus&amp;nbsp;you neither&amp;nbsp;need to be a  computer expert nor have anytechnical knowledge to perform Caller ID  spoofing. For more informationon SpoofCard service visit the following  link.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.gohacking.com/recom_products/SpoofCard.php&quot; target=&quot;_blank&quot;&gt;SpoofCard&lt;/a&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;u&gt;&lt;b&gt;How Caller ID Spoofing works?&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Caller  ID spoofing is done through various methods and usingdifferent  technologies. The most commonly used technologies to spoofCaller ID is  VOIP (Voice Over IP) and PRI&amp;nbsp;(Primary Rate Interface)&amp;nbsp;lines.&lt;br /&gt;
Today  most VOIP systems provide an option for it’s users to enterwhatever  number they want in the calling party field and this number issent  out&amp;nbsp;when they make a call. Hence it is easily possible for anyuser to  spoof Caller ID provided they have a VOIP system and know howto properly  configure it to spoof the Caller ID. However sites like SpoofCard  provide an easy and cheap spoofing services for those who aren’t using  VOIP systems that they can configure themselves.&lt;br /&gt;
&lt;br /&gt;
Caller  ID spoofing is possible and being performed right from thedays&amp;nbsp;Called  ID system was introduced. However most people are unawareof the fact  that it is possible to spoof&amp;nbsp; Caller ID&amp;nbsp;and make any numberto be  displayed on the receiver’s end.&amp;nbsp;In the past, Caller ID spoofingservice  was mostly used by telemarketers, collection agencies,law-enforcement  officials, and private investigators but today it&amp;nbsp;isavailable to any  Internet user who wish to perform Caller ID spoofing.&lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/8522394185779493397'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/8522394185779493397'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/how-to-spoof-caller-id-caller-id.html' title='How to Spoof Caller ID ? Caller ID Spoofing'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry><entry><id>tag:blogger.com,1999:blog-455175069379803891.post-7177568869999798718</id><published>2011-09-13T18:00:00.000+05:30</published><updated>2011-09-13T18:00:26.039+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cellphone Hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips &#39;n&#39; Tricks"/><title type='text'>Is your Nokia Cell Phone Original ?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img src=&quot;http://hackingelites.webs.com/nokia-phone-158x300.jpg&quot; /&gt;&lt;/div&gt;&lt;span class=&quot;fw_sanitized&quot;&gt;Nokia  is one of the largest selling phones across the globe.Most ofus own a  Nokia phone but are unaware of it’s originality.Are you keento know  whether your Nokia mobile phone is original or not? Then youare in the  right place and this information is specially meant for you.Your phones  IMEI (International Mobile Equipment Identity) number confirms your  phone’s originality.&lt;br /&gt;
&lt;br /&gt;
Press the following on your mobile &lt;span style=&quot;color: red; font-size: x-small;&quot;&gt;&lt;b&gt;*#06#&lt;/b&gt;&lt;/span&gt; to see your Phone’s &lt;span style=&quot;color: #3366ff;&quot;&gt;&lt;u&gt;&lt;b&gt;IMEI&lt;/b&gt;&lt;/u&gt;&lt;/span&gt; number(serial number).&lt;br /&gt;
Then check the 7th and 8th numbers&lt;br /&gt;
&lt;br /&gt;
Phone serial no. &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;x x x x x x ? ? x x x x x x x&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IF  the Seventh &amp;amp; Eighth digits of your cell phone are 02 or 20 this  means your cell phone was assembled in Emirates which is very Bad  quality&lt;br /&gt;
&lt;br /&gt;
IF the Seventh &amp;amp; Eighth digits of your cell  phone are 08 or 80 this means your cell phone was manufactured in  Germany which is fair quality&lt;br /&gt;
&lt;br /&gt;
IF the Seventh &amp;amp;  Eighth digits of your cell phone are 01 or 10 this means your cell phone  was manufactured in Finland which is very Good&lt;br /&gt;
&lt;br /&gt;
IF the  Seventh &amp;amp; Eighth digits of your cell phone are 00 this means your  cell phone was manufactured in original factory which is the best Mobile  Quality&lt;br /&gt;
&lt;br /&gt;
IF the Seventh &amp;amp; Eighth digits of your  cell phone are 13 this means your cell phone was assembled in Azerbaijan  which is very Bad quality and also dangerous for your heal&lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/7177568869999798718'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/455175069379803891/posts/default/7177568869999798718'/><link rel='alternate' type='text/html' href='http://convexcoders.blogspot.com/2011/09/is-your-nokia-cell-phone-original.html' title='Is your Nokia Cell Phone Original ?'/><author><name>Convex Coders</name><uri>http://www.blogger.com/profile/03434273576510455871</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Xi4pHy1VQBB_4mfPAuuZ8u-kyxwBqRF3juH75iZhWCQyWrmQpm83mrvFFLUpLMj0jhheYBbiXZzpCDw8kS-LKpOalz8CXOJb8_D8XJ0qQ7o6ZbkHe-wYEiEis11dVw/s220/Logo_1_edited%4028.5.11.jpg'/></author><georss:featurename>Chandigarh, India</georss:featurename><georss:point>30.7333148 76.7794179</georss:point><georss:box>30.6713883 76.7008279 30.795241299999997 76.8580079</georss:box></entry></feed>